Search for dissertations about: "evaluation of information"
Showing result 1 - 5 of 2133 swedish dissertations containing the words evaluation of information.
-
1. Information Systems Actability : Understanding Information Technology as a Tool for Business Action and Communication
Abstract : This dissertation is devoted to a perspective from which IT-based information systems are conceived as information technological artefacts intended for business action and communication. The perspective has been made concrete through the concept of information systems actability, which is the main concept under scrutiny. READ MORE
-
2. A Framework for the Strategic Management of Information Technology
Abstract : Strategy and IT research has been extensively discussed during the past 40 years. Two scientific disciplines Management Science (MS) and Management Information Science (MIS) investigate the importance of IT as a competitive factor. READ MORE
-
3. Morphosyntactic Corpora and Tools for Persian
Abstract : This thesis presents open source resources in the form of annotated corpora and modules for automatic morphosyntactic processing and analysis of Persian texts. More specifically, the resources consist of an improved part-of-speech tagged corpus and a dependency treebank, as well as tools for text normalization, sentence segmentation, tokenization, part-of-speech tagging, and dependency parsing for Persian. READ MORE
-
4. In search of information systems value : a case study of the EHR benefits realisation efforts of three Swedish hospitals
Abstract : The Swedish public health care organisation could very well be undergoing its most significant change since its specialisation during the late 19th and early 20th century. At the heart of this change is a move from using manual patient journals to electronic health records (EHR). READ MORE
-
5. Discovering Information Security Management
Abstract : This thesis is concerned with issues relating to the management of information security in organisations, motivated by the need for cost-efficient information security.It is based on the assumption that: in order to achieve cost-efficient information security, the point of departure must be knowledge about the empirical reality in which the management of information security takes place. READ MORE
